Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 11:34

General

  • Target

    6c89a6db8a17480ac16105b17428e750N.exe

  • Size

    41KB

  • MD5

    6c89a6db8a17480ac16105b17428e750

  • SHA1

    52186d3b7e56702636d2c3a2120bbaed4e7405f1

  • SHA256

    22e0f8313f1d852d1f4e9afbc2f322b8348e563632f7a075ceb2ac3e42c67436

  • SHA512

    87215ff90dc71ac5188782307a67345789180fa3839f24f9a5522c3e348ce56ad29ab642e95aaffcd2eb312bcccab1fbcdeb1697b94220cf5dca20d04f7e9ac9

  • SSDEEP

    384:GBt7Br5xjLvassAgA71FbhvYD/DggNNHpQKMNHpQKMwk:W7Blp2sspARFbhVgNNHpQRNHpQR/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3445) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c89a6db8a17480ac16105b17428e750N.exe
    "C:\Users\Admin\AppData\Local\Temp\6c89a6db8a17480ac16105b17428e750N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    bcfa33fd1727ee4b05c6917cb9116f67

    SHA1

    e31b01e154e9214019947a91611f7c6103104dcc

    SHA256

    752c94b78e9976c68d6f352b5b2366e8643a54e17f90ec4fa95190af18191964

    SHA512

    243d8302358c6c68714f2311c7f226d07bb4ca3410cb5fcbd290bd3ce9d3b13b78eae22b443c9782826a6ee299a69c826c0cd8eed8277a32306c3caf3b6ced12

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    73a2cbbc623880131fa6c6c3f65deda1

    SHA1

    8ef6459249e17608f202260b49b509b9ee23ede8

    SHA256

    5aed92755d067a2cb742f659136bcae28b3592cf5855148776b1c73ed806e26b

    SHA512

    bfa6c3cdbec96b8eda0633d2f49be494a35732e881f70b22aa585dac30b9a10232040d6563d64af879e29662fdce7af1d5b2f2afccb40e258e2929e2304624b6